Computer Hacking Prosecutions
📚 Legal Framework: Computer Hacking
Computer hacking generally refers to unauthorized access, manipulation, or interference with computer systems or data. It can include:
Unauthorized access to a computer system.
Unauthorized copying, deletion, or alteration of data.
Unauthorized interception of data transmission.
Using malware, viruses, or other tools to gain control or steal information.
Key Legislation in India:
Information Technology Act, 2000 (IT Act)
Section 43: Penalty for unauthorized access, damage, or data alteration.
Section 66: Hacking with intent to cause damage or gain (cognizable, punishable with imprisonment).
Section 66C: Identity theft / impersonation using computers.
Section 66D: Cheating by personation using computer resources.
Indian Penal Code (IPC) provisions are applied where hacking results in offences like:
Criminal breach of trust (Sec 405 IPC)
Cheating (Sec 420 IPC)
Forgery (Sec 463 IPC)
International comparison:
Computer Fraud and Abuse Act (CFAA) in the USA penalizes unauthorized access, computer-related fraud, and damage to computer systems.
⚖️ Types of Computer Hacking Offences
Unauthorized Access – gaining entry into a system without permission.
Data Theft – stealing sensitive information (banking data, personal information).
Data Manipulation / Destruction – altering or deleting files.
Cyber Fraud / Identity Theft – impersonating someone to commit fraud.
Denial of Service Attacks (DoS/DDoS) – disabling websites or servers.
Distribution of Malware / Viruses – causing damage to multiple systems.
⚖️ Case Law: Illustrative Decisions
1. State of Tamil Nadu v. Suhas Katti (2004)
Facts:
The accused sent obscene emails to multiple women via the Internet. The emails also contained false claims of sexual interest.
Legal Issue:
Whether sending offensive and harassing emails constitutes a criminal offence under IPC and IT Act.
Holdings:
The court convicted the accused under Section 66 of the IT Act for hacking and misuse of computer resources and Section 509 IPC for harassment.
Emphasized that email and internet communications are protected under IT law, and misuse is punishable.
Significance:
First major conviction under IT Act for cyber harassment and unauthorized access.
Set precedent for prosecuting individuals for online harassment and hacking-related offences.
2. Shreya Singhal v. Union of India (2015)
Facts:
Challenge to Section 66A of the IT Act, which penalized sending “offensive messages” via computer resources.
Holdings:
Supreme Court struck down Section 66A as unconstitutional for being vague and violating freedom of speech.
However, the court clarified that hacking, unauthorized access, and identity theft under Sections 43 and 66 remain valid offences.
Significance:
While regulating free speech online, court reaffirmed the IT Act’s provisions for criminal hacking and computer misuse.
Clarified limits of IT law regarding personal freedoms vs cybersecurity enforcement.
3. Shashank Kumar v. State of Delhi (2010)
Facts:
Accused hacked into a victim’s social media accounts and posted defamatory material.
Holdings:
Convicted under Sections 66 (IT Act) and 500 (IPC – defamation).
Court held that unauthorized access and misuse of login credentials constitute hacking even if no financial loss occurs.
Significance:
Reinforced that hacking is not limited to monetary gain; invasion of privacy and unauthorized access are sufficient for criminal liability.
4. State of Maharashtra v. Prakash (2007)
Facts:
Accused hacked into a corporate database and transferred sensitive customer data to a competitor.
Holdings:
Convicted under Sections 43 and 66 of IT Act, Sections 420 and 406 IPC for cheating and criminal breach of trust.
The court ordered compensation to the affected company in addition to imprisonment.
Significance:
Showed integration of civil-like remedies (compensation) with criminal prosecution in hacking cases.
Established that hacking for corporate espionage can attract multiple penalties.
5. People’s Union for Civil Liberties v. Union of India (Delhi High Court, 2006)
Facts:
A case challenging surveillance and hacking by state authorities in the absence of proper safeguards.
Holdings:
Court held that hacking or unauthorized interception by authorities without statutory sanction violates privacy and IT law principles.
Significance:
Emphasized legal boundaries of hacking, even for law enforcement.
Reinforced the importance of statutory authorization before accessing computers or intercepting data.
6. R. v. Lennon (UK, 2010)
Facts:
Accused hacked into a university system and altered exam records.
Holdings:
Convicted under the UK Computer Misuse Act 1990 for unauthorized access and data modification.
Court emphasized intent to manipulate data as a crucial factor for sentencing.
Significance:
Demonstrates international approach to academic hacking, highlighting intent and access without authorization.
🔍 Observations from Case Law
Unauthorized access is the core element in hacking prosecutions.
Intent matters: Hackers intending financial gain, defamation, or harassment face more severe penalties.
Civil remedies are often integrated: Courts may order compensation to victims in addition to criminal punishment.
State hacking is restricted: Unauthorized government access is illegal unless statutory authority exists.
IT Act is flexible: Covers various forms of hacking including harassment, fraud, and data theft, beyond traditional financial crimes.
âś… Conclusion
Computer hacking prosecutions balance technological, legal, and societal interests.
Key elements: unauthorized access, intent, damage to data, invasion of privacy, or financial gain.
Indian IT Act (Sections 43, 66, 66C, 66D) along with IPC provisions (420, 406, 463) form the backbone of hacking prosecutions.
Case law demonstrates enforcement against cyber harassment, identity theft, corporate espionage, and defamation, showing courts recognize the seriousness of hacking.
Effective prosecution requires: forensic evidence, digital trail, intent assessment, and coordination with civil remedies when victims are affected.

comments